Site logo
Authors
  • avatar Nguyễn Đức Xinh
    Name
    Nguyễn Đức Xinh
    Twitter
Published on
Published on

Which SSH key is used when connecting to a server?

When you SSH into a server, the SSH client automatically looks for and uses SSH keys stored in your system. Understanding which key is used can help troubleshoot connection issues and manage secure access effectively.

SSH Key Loading Process

The client attempts to authenticate using SSH keys in this order:

1. Command-line specified key (if using -i option)

ssh -i ~/.ssh/specific_key user@server

2. Keys listed in SSH config (if IdentityFile is specified)

The SSH client configuration file (~/.ssh/config) lets you specify which keys to use for which hosts:

Host myserver
    HostName myserver.com
    User myuser
    IdentityFile ~/.ssh/my_custom_key

If this file exists, SSH will prioritize the IdentityFile specified for that host instead of the default keys.

3. Default SSH Key Files in ~/.ssh/:

  • id_rsa (Private Key - RSA)

The SSH client checks the following key files in order of priority:

1. On Linux/macOS (~/.ssh/ directory)
  • ~/.ssh/id_rsa (Private Key - RSA)
  • ~/.ssh/id_ecdsa (Private Key - ECDSA)
  • ~/.ssh/id_ed25519 (Private Key - Ed25519)
  • ~/.ssh/id_dsa (Private Key - DSA, deprecated due to weak security)
2. On Windows (OpenSSH)
  • OpenSSH on Windows follows the same convention and looks in C:\Users\<username>\.ssh\.

SSH Agent

The SSH agent is a program that caches your decrypted private keys in memory, allowing you to:

  • Enter your passphrase only once per session
  • Use different keys for different servers without manual intervention

Start the agent with:

eval $(ssh-agent)

Add keys to the agent with:

ssh-add ~/.ssh/your_key

Agent forwarding (use with caution)

ssh -A user@hostname

Remember that agent forwarding should be used sparingly as it increases your attack surface.

Detailed Key Loading Sequence:

  1. The SSH client reads the configuration from:

    • System-wide config (/etc/ssh/ssh_config)
    • User-specific config (~/.ssh/config)
  2. For each authentication attempt, the client:

    • Checks if the private key file exists
    • Verifies file permissions (must be 600 for private keys)
    • Attempts to decrypt the key if it's passphrase-protected
    • Presents the corresponding public key to the server
  3. The server checks authorized_keys:

    • Looks in ~/.ssh/authorized_keys for the connecting user
    • Compares the presented public key with stored keys
    • If matched, generates a challenge encrypted with the public key
    • Client decrypts with private key to prove ownership

Checking Which SSH Key is Being Used

To check which SSH key is being used when connecting to a server, run:

ssh -v user@server.com

To list all SSH keys currently loaded in the SSH agent:

ssh-add -L

If no keys are found, you may need to start the SSH agent and add your key manually:

eval "$(ssh-agent -s)"
ssh-add ~/.ssh/id_rsa

Important Security Considerations:

  1. File Permissions:

    • ~/.ssh directory should be 700 (drwx------)
    • Private keys should be 600 (-rw-------)
    • authorized_keys should be 600 (-rw-------)
  2. Key Types:

    • Prefer ed25519 keys (ssh-keygen -t ed25519)
    • RSA keys should be at least 4096 bits
    • Avoid DSA keys (insecure)
  3. Passphrase Protection:

    • Always use passphrases for private keys
    • Use ssh-agent to avoid frequent passphrase entry

Summary

  • SSH automatically reads key files from ~/.ssh/ in order of priority.
  • The ~/.ssh/config file can override default key selection.
  • Use ssh -v to debug which key is being used.
  • The SSH agent manages loaded keys, and ssh-add can be used to add new ones.

Understanding these mechanisms will help you better manage SSH authentication and troubleshoot key-related issues. 🚀